CentOS Server Hardening Security Tips

23 CentOS Server Hardening Security Tips – Part 2

Continuing the previous tutorial on How to Secure and Harden CentOS server, in this article, we’ll discuss other security tips that will be presented on the below checklist. Requirements 20 CentOS Server Hardening Security

Install Memcached on CentOS 7

How to Install Memcached (Caching Server) on CentOS 7

Memcached is an open-source distributed memory object caching program that allows us to improve and speed up the performance of dynamic web applications by caching data and objects in Memory. Memcached is also used

Check Integrity With AIDE in Fedora

How to Check Integrity With AIDE in Fedora

AIDE (Advanced Intrusion Detection Environment) is a program for checking the integrity of a file and directory on any modern Unix-like system. It creates a database of files on the system, and then uses

Fail2ban to Secure Linux Server

How to Use Fail2ban to Secure Your Linux Server

Improving your server security should be one of your top priorities when it comes to managing a linux server. By reviewing your server logs, you may often find different attempts for brute force login,

Change FTP Port in Linux

How to Change FTP Port in Linux

FTP or File Transfer Protocol is one of the oldest network protocol used today as standard file transfers over computer networks. FTP protocol uses the standard port 21/TCP as command port. Although, there are

Check and Patch Meltdown Vulnerability in Linux

How to Check and Patch Meltdown CPU Vulnerability in Linux

Meltdown is a chip-level security vulnerability that breaks the most fundamental isolation between user programs and the operating system. It allows a program to access the operating system kernel’s and other programs’ private memory